Cloud Attack Vectors Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistan...

Full description

Bibliographic Details
Other Authors: Haber, Morey J., author (author), Chappell, J. B. (John Brian), author, Hills, Christopher (Security strategist), author
Format: eBook
Language:Inglés
Published: Berkeley, CA : Apress 2022.
Edition:1st ed. 2022.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009671496306719

Similar Items